Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption

Viet-An Pham, Dinh-Hieu Hoang, Huy-Hoang Chung-Nguyen, Mai-Khiem Tran, Minh-Triet Tran

Abstract


Visual logs become widely available via personal cameras, visual sensors in smart environments, or surveillance systems. Storing such data in public services is a common convenient solution, but it is essential to devise a mechanism to encrypt such data to protect sensitive information while enabling the capability to query visual content even in encrypted format at the services. More precisely, we need smart systems that their security and practicality must be balanced against each other. As far as we know, in spite of their importance in preserving personal privacy, such reliable systems have not gained sufficient attention from researchers. This motivates our proposal to develop a smart secure service for visual logs with a temporal interval query. In our system, visual log data are analyzed to generate high-level contents, including entities, scenes, and
activities happening in visual data. Then our system supports data owners to query these high-level contents from their visual logs at the server-side in a temporal interval while the data are still encrypted. Our searchable symmetric encryption scheme TIQSSE utilizes interval tree structure and we prove that our scheme achieves efficient search and update time while also maintaining all important security properties such as forward privacy, backward privacy, and it does not leak information outside the desired temporal range.


Full Text:

PDF

References


Boelter, T., Poddar, R., Popa, R.A.: A secure oneroundtrip index for range queries. IACR Cryptology ePrint Archive 2016, 568 (2016)

Bost, R.: o'o&: Forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. pp. 1143–1154. ACM (2016). https://doi.org/10.1145/2976749.2978303

Bost, R., Fouque, P.A.: Thwarting leakage abuse attacks against searchable encryption-a formal approach and applications to database padding. IACR

Cryptology ePrint Archive 2017, 1060 (2017)

Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. pp. 1465–1482. ACM (2017). https://doi.org/10.1145/3133956.3133980

Cash, D., Grubbs, P., Perry, J., Ristenpart, T.: Leakage-abuse attacks against searchable encryption. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. pp. 668–679. ACM (2015). https://doi.org/10.1145/2810103.2813700

Chang, Y.C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: IACR Cryptology ePrint Archive (2004)

Chung-Nguyen, H.H., Pham, V.A., Hoang, D.H., Tran, M.T.: Keyword-search interval-query dynamic symmetric searchable encryption. In: International Conference on Future Data and Security Engineering. pp. 673–680. Springer (2019). https://doi.org/10.1007/978-3-030-35653-8_46

Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security 19(5), 895–934 (2011). https://doi.org/10.3233/jcs-2011-0426

Dan Boneh, V.S.: A Graduate Course in Applied Cryptography (2017)

Goh, E.J., et al.: Secure indexes. IACR Cryptology ePrint Archive 2003, 216 (2003)

Grubbs, P., Sekniqi, K., Bindschaedler, V., Naveed, M., Ristenpart, T.: Leakage-abuse attacks against order-revealing encryption. In: 2017 IEEE Symposium on Security and Privacy (SP). pp. 655–672. IEEE (2017). https://doi.org/10.1109/sp.2017.44

Islam, M.S., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In: Ndss. vol. 20, p. 12. Citeseer (2012)

Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM conference on Computer and communications security. pp. 965–976. ACM (2012). https://doi.org/10.1145/2382196.2382298

Kerschbaum, F., Tueno, A.: An efficiently searchable encrypted data structure for range queries. In: Lecture Notes in Computer Science, pp. 344–364. Springer International Publishing (2019). https://doi.org/10.1007/978-3-030-29962-0_17

Le, N., Nguyen, D., Hoang, T., Nguyen, T., Truong, T., Duy, T.D., Luong, Q., Vo-Ho, V., Nguyen, V., Tran, M.: Smart lifelog retrieval system with habit-based concepts and moment visualization. In: Proceedings of the ACM Workshop on Lifelog Search Challenge, LSC@ICMR 2019, Ottawa, ON, Canada, 10 June 2019. pp. 1–6 (2019). https://doi.org/10.1145/3326460.3329155

Le, N., Nguyen, D., Nguyen, V., Tran, M.: Lifelog moment retrieval with advanced semantic extraction and flexible moment visualization for exploration. In: Working Notes of CLEF 2019 - Conference and Labs of the Evaluation Forum, Lugano, Switzerland, September 9-12, 2019. (2019)

Le, T.K., Ninh, V.T., Dang-Nguyen, D.T., Tran, M.T., Zhou, L., Redondo, P., Smyth, S., Gurrin, C.: Lifeseeker - interactive lifelog search engine at lsc 2019. In: Proceedings of the 2019 ACM Workshop on The Lifelog Search Challenge. ACM (2019). https://doi.org/10.1145/3326460.3329162

Münzer, B., Leibetseder, A., Kletz, S., Primus, M.J., Schoeffmann, K.: lifexplore at the lifelog search challenge 2018. In: Proceedings of the 2018 ACM Workshop on The Lifelog Search Challenge. pp. 3–8 (2018). https://doi.org/10.1145/3210539.3210541

Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. pp. 644–655. ACM (2015). https://doi.org/10.1145/2810103.2813651

Pham, V.A., Hoang, D.H., Chung-Nguyen, H.H., Tran, M.K., Tran, M.T.: Privacy preserving visual log service with temporal interval query using interval tree-based searchable symmetric encryption. In: Proceedings of the Tenth International Symposium on Information and Communication Technology. pp. 425–432 (2019). https://doi.org/10.1145/3368926.3369701

Redmon, J., Farhadi, A.: Yolov3: An incremental improvement (2018), http://arxiv.org/abs/ 1804.02767

Ren, S., He, K., Girshick, R., Sun, J.: Faster rcnn: Towards real-time object detection with region proposal networks. In: Proceedings of the 28th International Conference on Neural Information Processing Systems - Volume 1. pp. 91–99. NIPS’15, MIT Press, Cambridge, MA, USA (2015). https://doi.org/10.1109/tpami.2016.2577031

Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000. pp. 44–55. IEEE (2000). https://doi.org/10.1109/secpri.2000.848445

Sun, S.F., Yuan, X., Liu, J.K., Steinfeld, R., Sakzad, A., Vo, V., Nepal, S.: Practical backwardsecure searchable encryption from symmetric puncturable encryption. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. pp. 763–780. ACM (2018). https://doi.org/10.1145/3243734.3243782

Tran, M., Truong, T., Duy, T.D., Vo-Ho, V., Luong, Q., Nguyen, V.: Lifelog moment retrieval with visual concept fusion and text-based query expansion. In: Working Notes of CLEF 2018 - Conference and Labs of the Evaluation Forum, France, September 2018. (2018)

Truong, T.D., Dinh-Duy, T., Nguyen, V.T., Tran, M.T.: Lifelogging retrieval based on semantic concepts fusion. In: Proceedings of the 2018 ACM Workshop on The Lifelog Search Challenge. pp. 24–29. ACM (2018). https://doi.org/10.1145/3210539.3210545

Vo-Ho, V.K., Luong, Q.A., Nguyen, D.T., Tran, M.K., Tran, M.T.: Personal diary generation from wearable cameras with concept augmented image captioning and wide trail strategy. In: Proceedings of the Ninth International Symposium on Information and Communication Technology. pp. 367–374. SoICT 2018, ACM (2018). https://doi.org/10.1145/3287921.3287955

Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE transactions on parallel and distributed systems 27(2), 340–352 (2015). https://doi.org/10.1109/tpds.2015.2401003

Zhang, Y., Katz, J., Papamanthou, C.: All your queries are belong to us: The power of fileinjection attacks on searchable encryption. In: 25th fUSENIXg Security Symposium (fUSENIXg Security 16). pp. 707–720 (2016)

Zhou, B., Lapedriza, A., Khosla, A., Oliva, A., Torralba, A.: Places: A 10 million image database for scene recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence (2017). https://doi.org/10.1109/tpami.2017.2723009




DOI: https://doi.org/10.31449/inf.v44i2.3090

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.